![]() Hint: For further investigation it's always a good idea to log to a file. ![]() If you don't enter a value, the Sniffer runs forever until you stop it with We can also see the corresponding TCP Sequence numbers. With information level set to Verbose 4, we see a summary of Source and Destination IP Address, as well as Source and Destination Port. Finally the session is acknowledged and established after the 3-way TCP handshake. 192.168.0.30 tries to connect to 192.168.0.1 on Port 80 with a syn and gets a syn ack back. ![]() > 192.168.0.1.80: ack 3792179543Īpparently we caught some more interesting information, just when a TCP session was being set up. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |